SlideShare a Scribd company logo
SUMMER TRAINING PRESENTATION
ON
CISCO CERTIFIED NETWORK ASSOCIATE
08/13/13BASED ON CCNA
1
ABOUT CCNA
 This certification builds a
foundation in and apprentice
knowledge of networking.
 CCNA certified professionals can install, configure,
and operate LAN, WAN and daily access services
for small networks (100 modes or fewer), including
but not limited to use of these protocols: IP, IGRP,
SERIAL FRAME-RELAY, IP RIP, VLANs, RIP
ETHERNET, ACCESS-LISTS.
08/13/13BASED ON CCNA
2
08/13/13BASED ON CCNA
3
Router user interface
The Cisco IOS software uses a command-line
interface (CLI) as the traditional console
environment.
This environment is accessible through
several methods:
 Console
 AUX port (modem)
 Telnet
Establishing a HyperTerminal session
08/13/13BASED ON CCNA
4
Take the following steps to connect a terminal to the console port on the router:
• Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to
DB-9 or RJ-45 to DB-25 adapter.
• Configure the terminal or PC terminal emulation software for 9600 baud, 8 data
bits, no parity, 1 stop bit, and no flow control.
Rollover cable
Console port
Com1 or Com2 serial port
Terminal or a
PC with
terminal
emulation
software
Router
08/13/13BASED ON CCNA
5
• The IOS provides a command interpreter service known as the
command executive (EXEC).
• After each command is entered, the EXEC validates and executes the
command.
• The levels are user EXEC mode and privileged EXEC mode.
08/13/13BASED ON CCNA
6
Router#configure terminal
Router(config)#
08/13/13BASED ON CCNA
7
Not recommended, clear text
Router(config)#enable secret <password>
Use this command instead, password is encryped
Encrypts the passwords
above, but…
• On serial links that are directly interconnected, as in a lab environment,
one side must be considered a DCE and provide a clocking signal.
• The clock is enabled and speed is specified with the clock rate
command.
Router(config)#interface serial 0/0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
08/13/13BASED ON CCNA
8
08/13/13BASED ON CCNA
9
It is also called Network Traffic Control
Management (NTCM). We can provide restrictions to
individual users, subnets and services etc.
ACL
Standard ACL Extended ACL
Any access list is identified by its number.
S. A. L 1 – 99
Ex. A. L 100 - 199
08/13/13BASED ON CCNA
10
Rules for creating and implementing
Access List
1. Access list must begin with the Deny Statements (If
exists) then Permit Statements must follow.
2. There must be at least one Permit Statement as an
Implicit “Deny All” always exists.
3. While Implementation of Access list, There must be
only one Access list per Interface, per direction and
per protocol.
08/13/13BASED ON CCNA
11
Router A Router B
S 0 172.16.1.1 172.16.1.2 S 0
E 0 5.50
1.1
1.21.3
1.4
5.1
5.2
5.4
5.3
E 0 1.50
Syntax
Router(config)# Access-list ALNO P/D Src Src-WCM
Router(config)# Int <name of interface>
Router(Config-if)#Ip Access-Group <Direction>
Layer 2 switching is the process of
using the hardware address of devices
on LAN to segment a network.
In multiple links between switches we
face multi looping problems. To solve
this problem switches run Spanning
Tree Protocol (STP).
08/13/13BASED ON CCNA
12
A VLAN is a logical grouping of network
users and resources connected to
administratively defined ports on a switched.
A group of users that need an unusually
high level of security can be put into its own
VLAN so that users outside of the VLAN
can’t communicate with them. So it provide
security.
08/13/13BASED ON CCNA
13
Switch>show vlan
Switch>enable
Switch#vlan database
Switch(vlan)#vlan vlan-id name vlan-name
Switch(vlan)#exit or ^z.
08/13/13BASED ON CCNA
14
08/13/13BASED ON CCNA
15
• STP is a loop-
prevention protocol
• Uses the Spanning Tree
Alogithm
• STP allows L2 devices to
communicate with each
other to discover physical
loops in the network.
• STP specifies an algorithm
that L2 devices can use to
create a loop-free logical
topology.
08/13/13BASED ON CCNA
16
• By default, STP is enabled for every port on
the switch.
• If for some reason STP has been disabled,
you can reenable it.
• To re-enable STP, use the
Switch(config)#spanning-tree vlan vlan-id
• To disable STP, on a per-VLAN basis:
Switch(config)#no spanning-tree vlan vlan-id
A packet-switched technology that made its
debut in the early 1990s, Frame Relay is a
high-performance Data Link and Physical
layer specification. An upside to Frame Relay
is that it can be more cost effective than point-
to-point links, plus it typically runs at speeds of
64Kbps up to 45Mbps (T3). Another Frame
Relay benefit is that it provides features for
dynamic bandwidth allocation and congestion
control.
08/13/13BASED ON CCNA
17
F r a m e R e la y
N e t w o r k
H e a d q u a r t e r s
H u b C it y
S a t e llit e O f f ic e 1
S p o k a n e
S a t e llit e O f f ic e 2
S p o k o m o
1 7 2 .1 6 .1 .1 1 7 2 .1 6 . 1 . 3
1 7 2 .1 6 . 1 . 2
D L C I 1 0 1
D L C I 1 0 2
D L C I 1 1 2
D L C I 2 1 1
HubCity
interface Serial0
ip address 172.16.1.2
255.255.255.0
encapsulation frame-relay
(Inverse-ARP still works here)
Spokane
interface Serial0
ip address 172.16.1.1
255.255.255.0
encapsulation frame-relay
frame-relay map ip 172.16.1.3 102
frame-relay map ip 172.16.1.2 102
Spokomo
interface Serial0
ip address 172.16.1.3
255.255.255.0
encapsulation frame-relay
frame-relay map ip 172.16.1.1 211
frame-relay map ip 172.16.1.2 211
Frame-Relay Map Statements
Notice that the routers are configured to use either IARP or Frame Relay
maps. Using both on the same interface will cause problems.
08/13/13BASED ON CCNA
18
THANK YOUTHANK YOU
08/13/13BASED ON CCNA
19

More Related Content

What's hot

CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
Prince Gautam
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
HoneyKumar34
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
Networking Training
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
golarsnetworks34
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)
Arunabh Deka
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
RandyDookheran1
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
Andy Juan Sarango Veliz
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3Ibby Nuj
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
Unni Kannan VijayaKumar
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
Mansour Naslcheraghi
 

What's hot (20)

CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 

Viewers also liked

Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Dân Chơi
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
VISHNU N
 
ppt on 6 weeks summer training
ppt on 6 weeks summer training ppt on 6 weeks summer training
ppt on 6 weeks summer training
Pulkit Mahajan
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
singhsukdeep
 
CCNA part 7 acl
CCNA part 7 aclCCNA part 7 acl
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
Ahmed Habib
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
Ahmed Habib
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
Ahmed Habib
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
samis
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
Vuz Dở Hơi
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
Ahmed Habib
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
faust0
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
Madhan Banda
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
 

Viewers also liked (20)

Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
 
ppt on 6 weeks summer training
ppt on 6 weeks summer training ppt on 6 weeks summer training
ppt on 6 weeks summer training
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
CCNA part 7 acl
CCNA part 7 aclCCNA part 7 acl
CCNA part 7 acl
 
ccna project
ccna projectccna project
ccna project
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
 
Ccna security
Ccna securityCcna security
Ccna security
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 

Similar to CCNA 2

Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
amit singh
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
parthasn83
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
PacketBase, Inc.
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
ssusercbaa33
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
galerussel59292
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commandsAreej Khasawneh
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
Vinod Kumar Balasubramanyam
 
5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать
SkillFactory
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
ManageEngine, Zoho Corporation
 
configuration of switch campus network
configuration of switch campus networkconfiguration of switch campus network
configuration of switch campus network
subhash subbu
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
Cisco Russia
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
abdenour boussioud
 

Similar to CCNA 2 (20)

Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Ducat
DucatDucat
Ducat
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
corporate network
corporate networkcorporate network
corporate network
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
Lab6.4.1
Lab6.4.1Lab6.4.1
Lab6.4.1
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
Zxdsl 9210 guide
Zxdsl 9210 guideZxdsl 9210 guide
Zxdsl 9210 guide
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
Samplab19
Samplab19Samplab19
Samplab19
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commands
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
 
configuration of switch campus network
configuration of switch campus networkconfiguration of switch campus network
configuration of switch campus network
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
 

More from Asish Verma

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Asish Verma
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)Asish Verma
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsisAsish Verma
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERAsish Verma
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)Asish Verma
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)Asish Verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6Asish Verma
 

More from Asish Verma (13)

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsis
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVER
 
Pt report(body)
Pt report(body)Pt report(body)
Pt report(body)
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)
 
Pt report(cert)
Pt report(cert)Pt report(cert)
Pt report(cert)
 
Asish verma
Asish vermaAsish verma
Asish verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

CCNA 2

  • 1. SUMMER TRAINING PRESENTATION ON CISCO CERTIFIED NETWORK ASSOCIATE 08/13/13BASED ON CCNA 1
  • 2. ABOUT CCNA  This certification builds a foundation in and apprentice knowledge of networking.  CCNA certified professionals can install, configure, and operate LAN, WAN and daily access services for small networks (100 modes or fewer), including but not limited to use of these protocols: IP, IGRP, SERIAL FRAME-RELAY, IP RIP, VLANs, RIP ETHERNET, ACCESS-LISTS. 08/13/13BASED ON CCNA 2
  • 3. 08/13/13BASED ON CCNA 3 Router user interface The Cisco IOS software uses a command-line interface (CLI) as the traditional console environment. This environment is accessible through several methods:  Console  AUX port (modem)  Telnet
  • 4. Establishing a HyperTerminal session 08/13/13BASED ON CCNA 4 Take the following steps to connect a terminal to the console port on the router: • Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter. • Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control. Rollover cable Console port Com1 or Com2 serial port Terminal or a PC with terminal emulation software Router
  • 5. 08/13/13BASED ON CCNA 5 • The IOS provides a command interpreter service known as the command executive (EXEC). • After each command is entered, the EXEC validates and executes the command. • The levels are user EXEC mode and privileged EXEC mode.
  • 6. 08/13/13BASED ON CCNA 6 Router#configure terminal Router(config)#
  • 7. 08/13/13BASED ON CCNA 7 Not recommended, clear text Router(config)#enable secret <password> Use this command instead, password is encryped Encrypts the passwords above, but…
  • 8. • On serial links that are directly interconnected, as in a lab environment, one side must be considered a DCE and provide a clocking signal. • The clock is enabled and speed is specified with the clock rate command. Router(config)#interface serial 0/0 Router(config-if)#clock rate 64000 Router(config-if)#no shutdown 08/13/13BASED ON CCNA 8
  • 9. 08/13/13BASED ON CCNA 9 It is also called Network Traffic Control Management (NTCM). We can provide restrictions to individual users, subnets and services etc. ACL Standard ACL Extended ACL Any access list is identified by its number. S. A. L 1 – 99 Ex. A. L 100 - 199
  • 10. 08/13/13BASED ON CCNA 10 Rules for creating and implementing Access List 1. Access list must begin with the Deny Statements (If exists) then Permit Statements must follow. 2. There must be at least one Permit Statement as an Implicit “Deny All” always exists. 3. While Implementation of Access list, There must be only one Access list per Interface, per direction and per protocol.
  • 11. 08/13/13BASED ON CCNA 11 Router A Router B S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.21.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Syntax Router(config)# Access-list ALNO P/D Src Src-WCM Router(config)# Int <name of interface> Router(Config-if)#Ip Access-Group <Direction>
  • 12. Layer 2 switching is the process of using the hardware address of devices on LAN to segment a network. In multiple links between switches we face multi looping problems. To solve this problem switches run Spanning Tree Protocol (STP). 08/13/13BASED ON CCNA 12
  • 13. A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switched. A group of users that need an unusually high level of security can be put into its own VLAN so that users outside of the VLAN can’t communicate with them. So it provide security. 08/13/13BASED ON CCNA 13
  • 14. Switch>show vlan Switch>enable Switch#vlan database Switch(vlan)#vlan vlan-id name vlan-name Switch(vlan)#exit or ^z. 08/13/13BASED ON CCNA 14
  • 15. 08/13/13BASED ON CCNA 15 • STP is a loop- prevention protocol • Uses the Spanning Tree Alogithm • STP allows L2 devices to communicate with each other to discover physical loops in the network. • STP specifies an algorithm that L2 devices can use to create a loop-free logical topology.
  • 16. 08/13/13BASED ON CCNA 16 • By default, STP is enabled for every port on the switch. • If for some reason STP has been disabled, you can reenable it. • To re-enable STP, use the Switch(config)#spanning-tree vlan vlan-id • To disable STP, on a per-VLAN basis: Switch(config)#no spanning-tree vlan vlan-id
  • 17. A packet-switched technology that made its debut in the early 1990s, Frame Relay is a high-performance Data Link and Physical layer specification. An upside to Frame Relay is that it can be more cost effective than point- to-point links, plus it typically runs at speeds of 64Kbps up to 45Mbps (T3). Another Frame Relay benefit is that it provides features for dynamic bandwidth allocation and congestion control. 08/13/13BASED ON CCNA 17
  • 18. F r a m e R e la y N e t w o r k H e a d q u a r t e r s H u b C it y S a t e llit e O f f ic e 1 S p o k a n e S a t e llit e O f f ic e 2 S p o k o m o 1 7 2 .1 6 .1 .1 1 7 2 .1 6 . 1 . 3 1 7 2 .1 6 . 1 . 2 D L C I 1 0 1 D L C I 1 0 2 D L C I 1 1 2 D L C I 2 1 1 HubCity interface Serial0 ip address 172.16.1.2 255.255.255.0 encapsulation frame-relay (Inverse-ARP still works here) Spokane interface Serial0 ip address 172.16.1.1 255.255.255.0 encapsulation frame-relay frame-relay map ip 172.16.1.3 102 frame-relay map ip 172.16.1.2 102 Spokomo interface Serial0 ip address 172.16.1.3 255.255.255.0 encapsulation frame-relay frame-relay map ip 172.16.1.1 211 frame-relay map ip 172.16.1.2 211 Frame-Relay Map Statements Notice that the routers are configured to use either IARP or Frame Relay maps. Using both on the same interface will cause problems. 08/13/13BASED ON CCNA 18